Results 271 to 280 of about 376,317 (337)
A hybrid algorithmic model for enhancing security in intelligent reflecting surface-assisted wireless communication. [PDF]
S S, S M.
europepmc +1 more source
Abstract Writing is crucial in tertiary education, yet enhancing the complexity of academic writing presents significant challenges for second language (L2) learners. This study explores the potential of dialogue journal writing (DJW), an interactive and low‐stress classroom activity, to enhance writing complexity among novice L2 writers.
Barry Lee Reynolds +2 more
wiley +1 more source
Patched-Based Swin Transformer Hyperprior for Learned Image Compression. [PDF]
Buthelezi SB, Tapamo JR.
europepmc +1 more source
Modeling macroscopic brain dynamics with brain-inspired computing architecture. [PDF]
Zheng Z +9 more
europepmc +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Non-Uniform Entropy-Constrained <i>L</i><sub>∞</sub> Quantization for Sparse and Irregular Sources. [PDF]
Alecu AA +3 more
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu +3 more
wiley +1 more source
Hardware-Oriented Approximations of Softmax and RMSNorm for Efficient Transformer Inference. [PDF]
Kang Y, Wang D.
europepmc +1 more source
A Quantised Push‐Sum Distributed Adaptive Momentum Algorithm for Optimisation Over Directed Networks
ABSTRACT In this paper, we investigate a distributed constrained optimisation problem over directed networks. The agents in the networks conduct local computations and communications, endeavouring to collaboratively minimise the aggregation of all locally known convex cost functions subject to a global constraint set.
Qingguo Lü +6 more
wiley +1 more source

